Transcription

1 Scenario #1 Jake and the Bad Virus The two major C3 concepts this scenario illustrates are: Cyber Security: Jake compromised his computer s security by providing personal information to an unknown online source, which lead to his computer becoming vulnerable to receiving a virus. Cyber Ethics: Jake does not act ethically when he is not open with his parents about what happened to his computer. Although it can be scary to admit a mistake and accept possible consequences, it is never a good choice to continue to let possible further harm occur to anyone or anything by covering up a poor choice to avoid getting in trouble. This is a perfect example of why it is so important to maintain open communication with parents and guardians, so that when something negative happens online, the focus is on correcting the issue, rather than panic over admitting a mistake because one is worried they will get into trouble or have their computer taken away. Jake s four mistakes: 1. He opened an from an unknown source. 2. He took the bate in this phishing scam that promised something too good to be true. 3. He provided personal information to an unknown source 4. He was not honest to his parents or guardians about the negative experience he had online that compromised the family computer s security. What should Jake have done? 1. Jake s first step should have been to delete the from the unknown source without opening it. 2. After opening the fraudulent , Jake s knowledge of the WWW Decision Tool should have made him suspicious when the unknown source started asking for personal information. He could have then stopped, deleted the , told his parents and even reported the incident to the Federal Trade Commission. 3. The most important step Jake should have taken, was after making the mistake that caused the virus, Jake should have told his parents about the incident so they can restore their computer s security and prevent further loss of private information.

2 Scenario #2- Emily and Romanita s Long Distance Friendship The two major C3 Concepts this scenario illustrates: Cyber Safety- Remember, you don t know people you meet online. Unfortunately, you must be aware that there are individuals who can pretend to be someone they are not in order to do harm. Cyber Ethics- Acting responsible by honestly following the guidelines and rules your parents or guardians have established for online use. Remember they are designed to keep you and your computer safe! Questions (set #1) 1. Emily s main error was not following her parent s rules and guidelines. If she had simply followed these 100%, she never would have accepted the unknown friend s request. 2. This unknown person tricked Emily several ways: -They saw that she communicates regularly with someone in Boston, so they used a Boston address. In truth, they could be anywhere in the world. -They tried to use common online lingo to build trust by sounding like a fellow student. This is how some individuals trick students in providing personal information. -They formed an that made them appear to be a 12 year old girl. Questions (set #2) Emily should take the following steps to be extra safe from this phony online friend: 1. Tell her parents what happened. Her safety and the safety of her true online friends are more important than the possible risk of getting into trouble. The main concern of most parents in student safety. 2. Tell her friend Romanita and her other parent approved online friends about the incident, just in case this person tries to contact them. 3. Block this person to prevent them from contacting her again.

3 Scenario #3 The major two C3 Concepts that Aimee failed to follow were: Cyber Ethics- Aimee did not behave ethically by honoring her parent s rules or by following copyright laws. Cyber Security-Aimee compromised herself and her computer s security by providing detailed personal information to an unknown online source. Aimee s poor choices: 1. Aimee was dishonest with her parents by disobeying the rules she agreed to follow about the MP3 Player. 2. Aimee went against her gut and downloaded something illegitimately just to get the song she wanted. Compromising your ethics for a song is a bad trade off. 3. Aimee provided personal information to an unknown source. 4. Aimee did something illegal by not following copyright laws and showed no regard for the artist who created the album she loved. Answers to Specific Questions: 1. Aimee s actions were illegal. Many students do not realize that they can be arrested or their parents can be fined hundreds of thousands of dollars for illegal downloading of music. Real lawsuits have already taken place across the country. 2. Aimee s friend does not sound like a true friend. She encouraged her friend to disobey her parents and told her to visit and use a secret website, which doesn t sound legal. 3. Aimee s actions are most unfair to the musicians and songwriters who are not getting paid for the hard work they put into creating a song people enjoy listen to. If you worked hard to create something, how would you feel if others dishonestly took advantage and didn t pay you?

4 Scenario #4 The major C3 Concept that Alex s mom compromised is: Cyber Security There are many, many fraudulent websites that try to trick users in providing personal information or install and spread viruses. Alex s mom did not know the important items to look for to verify if a website is legitimate. How Alex protected his mom from making a mistake: 1. Legitimate websites asking for credit card information will have a symbol that verifies that they protect personal information and typically offer various secure pay options for those concerned about security. Risks: 2. Alex s mom could have damaged the computer by becoming vulnerable to a virus 3. Alex s mom could have been a victim of Identity Theft by providing personal information. 4. Alex s mom could have lost money and compromised her financial information. Recommended steps if Alex s mom wants to shop online: 1. Purchase the bag from a legitimate company she is already familiar with and trusts. 2. Go to National Cyber Security Alliance s website for suggested tips on safe online shopping. 3. Make sure the website has security symbols verifying that they protect personal information.

5 Scenario #5 The two major C3 Concepts that this scenario illustrates: Cyber Security- Scott s actions could have jeopardized the school s computer and network security. Cyber Ethics- Scott signed the school s acceptable use policy agreeing to follow school rules for computer use. He did not honor his responsibility when he chose to go against school rules to get something he wanted for free. Questions: (set #1) 1. Making your computer vulnerable to a virus. 2. It is hard to verify if a free download is legitimate. Here are a couple of possible tips: - Ask yourself if the free offer is from a reputable company. If so, verify with the company by phone that they are truly making this offer. -Ask yourself if this offer is too good to be true. If it sounds too good to be true, it probably is. Your antenna should go up that his may be a phony attempt to do harm to you or your computer. 3. It is hard to say. By simply accessing the link to accept the free download, it is possible that he made the school network security vulnerable. 4. Scott could have compromised his own protection as well as that of his classmates by allowing private information to be passed through the school network. He could also have been charged with vandalizing school property if his actions damaged the school s computer. Questions: (set #2) 1. This is a difficult ethics question. As tough as it might be, Scott should act in the school s best interest and inform his teacher of the mistake he made. By doing so, the school can correct the situation immediately to limit any further threat to security of the computer or to the school s network. 2. Who is asking for the personal information? What are they asking for? Why do they need this information?

6 Scenario #6 The major C3 Concept his scenario illustrates is: Cyber Security Illegal hackers who intend harm to others and to their computers can be very clever. This was an obvious attempt to trick Roxanna into compromising her computer s security by posing to be a legitimate update. This is a common way viruses or malware are spread onto a computer. Questions (set #1) 1. Roxanna did not attempt to do anything wrong. She simply thought she was doing her job of making sure the computer s security software remained up to date. 2. One important thing Roxanna could have done to be extra careful, is to think of the last time her security software was updated and which company they use. If it is her job to keep the software updated, her parents or guardians need to make sure she knows the schedule for how often updates occur. This alone can help her recognize an attempt to get her to download a possible virus through a phony anti-virus update. Questions (set #2) Some possible risks associated with accepting these pop-up links include: 1. Roxanna could have downloaded a virus, malware or spyware. 2. Roxanna could have allowed a clever computer hacker to follow her future keystrokes and track her family s personal information. 3. Roxanna could have compromised her computer s hard drive. Explanations: 1. No computer hacker is ever going to make it obvious that they are trying to spread something harmful to your computer. Instead they will often try to pose themselves as a legitimate action a C3 savvy computer user might not recognize as harmful. 2. One type of hacker is specifically trying to hijack your computer to track your keystrokes. These criminals are often trying to gain access to personal information including passwords or credit card information. 3. Some hacker s main goal is simply to ruin or crash your computer s hard drive so you lose all valuable information.

7 Scenario #7 The major C3 Concept this scenario illustrates is: Cyber Security- Curtis gave up his computer s security by allowing his friends to know his password. These are never to be shared with anyone other than a parent or guardian. It is a good idea for parents and guardians to keep passwords to make sure you remain safe and secure. Questions (set #1) 1. Curtis friends made themselves vulnerable in two ways by sharing their personal information: A. They opened their computer s security and their safety to these friends. B. They opened their computer s security and their safety to anyone else these friends choose to share this private information with, now that it is available. 3. No, Curtis should not share this information with these friends. Just because you spend time with friends, doesn t mean you have to follow everything they do. If they are doing something that doesn t seem right, you should feel completely comfortable standing up for what you think is right. Questions (set #2) 1. Each of Curtis classmates should reset their passwords immediately, and should be sure to choose new passwords that are not similar to the old passwords. 2. Who is asking for the information? What are they asking? Why do they need this information? 3. Curtis friends are not acting like friends. True friends will never push you to do something you are not comfortable with, such as revealing personal information that could be harmful to you, possibly your family, and definitely your computer.

8 Scenario #8 The two major C3 Concepts this scenario illustrates: Cyber Ethics: It is absolutely unethical to use the Internet to intend to hurt or threaten anyone. It is not funny or entertaining at all and shows lack of computer ethics and responsibility. If it is something you know would hurt or embarrass someone in person then it is something that is also not okay to do or say online. Cyber Safety: Cyberbullying is extremely unsafe and in some cases has led to very serious consequences for both the cyberbullies and the victims they are harassing. Questions (set #1) 1. Not only is cyberbullying extremely unethical, but laws also protect students from being bullied either in person or online. Because of certain serious consequences that have resulted from cyberbullying, local law enforcement as well as Federal authorities such as the United States Secret Service, can now prosecute students and families who cyberbully. 2. Stop responding immediately to anyone online who makes you feel uncomfortable or who you don t trust and know well in person. 3. Block this person from ever contacting you again. 4. Tell your parents or guardians, and in this case, because it involves classmates at school, tell your teacher. Questions (set #2) 1. Caroline could tell her own parents about the incident and inform their teacher at school so she can avoid future situations such as these with this group of unkind girls. 2. Cyberbullies People who use the Internet bully people online. 3. (Each school s answer might be different.) Some students may be very aware of the school s rules regarding cyberbullying, while other students may not be aware at all. There is still large variation between how schools are handling cyberbullying cases across the country.

National Cybersecurity Awareness Campaign Kids Presentation About Stop.Think.Connect. In 2009, President Obama asked the Department of Homeland Security to create the Stop.Think.Connect. Campaign to help

STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.

Grade Level- Middle/High School Ethics-plagiarism Scenario #1 - Brian and His Research Paper Brian has a research paper due next week on the impact of cyber security threats to our national security. He

Only talk with people online that you know in person Time does not equal trust It doesn t mean you really know the person Be suspicious; ANY person worth having as a friend wouldn t ask you to put yourself

HEADS up stop think connect Stop.Think.Connect. TM is a national public awareness campaign aimed at increasing the understanding of cyber threats and empowering the American public to be safer and more

E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

Digital Citizenship Lesson Plan This course is to help people to understand how to use the Internet in a safe, productive way. Additional resources and links are available on the TechTECS website. http://techtecs.com/digital-citizenship

CYBER SAFETY, CYBER ETHICS, CYBER SECURITY How to teach the kids about these concepts (a primer from staysafeonline.org program that is available free from the website) YOUR PRESENTERS Maryly Skallos Technology

LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

Internet Safety & Awareness Dan Tomlinson 02/23/2013 Internet risks Top six tips for online safety What to do if there is a problem Online safety resources Internet Risks Primary Threats to your Computer

When Fraud Comes Knocking Identity theft occurs when someone uses your name, Social Security number, credit card number, or other personal information without your permission. It is a very serious crime.

Internet Safety/CIPA Lesson Plan Social Networking Overview Students need to safely use the Internet for learning, socializing, and for preparing for college and work. While firewalls, antivirus software,

Safer Internet Day Quiz Are you a good friend online? Safer Internet Day 2015 is all about helping to create a better internet together. One way to do this is to be a good friend to others online. What

Bullying Prevention: Cyber Bullying Handout 6A: Pros and Cons Name: Make a list of pros and cons of electronic socializing. Be very specific when you list your ideas. To get started, think of the following

Telecommunication Tools TECHNOLOGY The Internet is like a giant web of computers connected. The Internet is also called the World Wide Web. There are good places to go on the Internet and there are some

Case study: What the? Online scams and identity theft Theme The internet and mobile technologies are a source of scams and identity theft. Key learning/subject areas Cross curricula. Duration One to two

Cyber Safety For Parents Introduction With the advent of the Internet, good and bad information is available with just the click of a mouse. Kids spend a lot of time online, e-mailing, blogging, chatting

E-Safety Issues and Online Safety Parents Evening Aims of This Presentation To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and

A WorkLife4You Guide Seven Practices for Computer Security Access to information and entertainment, credit and financial services, products from every corner of the world even to your work is greater than

Estimated time: 45 minutes Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives Overview: Students learn strategies for guarding against

E-Safety Issues and Online Safety Parents Evening To look at how your children use the internet To raise your awareness of online safety To provide guidance on online safety and privacy for your children

Appropriate Online Behavior Social Networking Etiquette Cyber Bullying Awareness Gordon Cooper Technology Center 2012 From http://onguardonline.gov/ Think Before You Share What you post could have a bigger

Safer Internet Day Quiz Safer Internet Day 2014 is all about helping to create a better internet together. But do you make good decisions online? Test your internet safety knowledge by taking our Safer

FAMILY GUIDE TO Mobile Safety How to keep your children safe and connected in today s mobile world SPONSORED BY: Is Your Child Ready for a Mobile Phone? MOBILE PHONES ARE PART OF OUR LIVES. They re powerful

Fraud Protection module Trainer s Introduction While the vast majority of financial transactions are legitimate and honest, the few fraudulent ones can be costly and damaging. By recognizing the warning

AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out

Class 3: Identify Tricks and Scams Online Identify Tricks and Scams Online Instructor s Overview DESCRIPTION: In this lesson, students will learn how to avoid online tricks and scams, and learn best practices

Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.

Online Security Tips Is your computer set to automatically check for software and security updates? Do you type your name in search engines to see what personal information is online? Have you customized

YOUNG PEOPLE, MUSIC & THE INTERNET a guide for parents about P2P, file-sharing and downloading What is P2P? As a parent, you ve probably already heard your children talk about file-sharing, downloading

Cyberbullying: What Parents Can Do to Protect Their Children Sponsored by: 2013, PACER Center, Inc. As Technology Evolves, So Do the Ways to Bully Imagine the note, a piece of paper ripped from a notebook,

Annual Education 2014 Why? Protecting patient information is an essential part of providing quality healthcare. As Mission Health grows as a health system and activities become more computerized, new information

Protecting Yourself from Identity Theft Guide 4 Because you don t have to be the next victim Desert Schools Money Matters Series Guiding you toward financial success Table of Contents How ID theft happens.............................

Cyber Security Awareness Internet Safety Intro www.staysafeonline.org 1 What is Cyber Security? Cyber Security is the body of technologies, processes and practices designed to protect from attack, damage

FIRBANK GRAMMAR SCHOOL TECHNOLOGY GUIDELINES AND PROCEDURES FOR THE USE OF TECHNOLOGY STUDENTS Updated 2014 1 FIRBANK GRAMMAR SCHOOL Table of Contents POLICY FOR THE ACCEPTABLE USE OF TECHNOLOGY - students...

- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online

Deter, Detect, Defend Deter Never provide personal information, including social security number, account numbers or passwords over the phone or Internet if you did not initiate the contact Never click

Credit and Debit Card Security Tips Many of these tips are just common sense and others are tips to keep in mind when doing a transaction, at ATMs, restaurants and merchants. Be careful with your PIN Always

Office of the Privacy Commissioner of Canada Identity Theft and You There have always been scammers who pose as somebody else to carry out fraudulent activities. With today s proliferation of technology,

A Time to Tell Troop Meeting Guide Using This Guide The video A Time to Tell shows several strategies child molesters use to attempt sexual molestation. In addition, one scenario introduces bullying as

What you need to know to keep your computer safe on the Internet Tip 1: Always install Operating System updates The most important steps for any computer user is to always install updates, especially security

NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the

Computer Security Self-Test: Questions & Scenarios Rev. Sept 2015 Scenario #1: Your supervisor is very busy and asks you to log into the HR Server using her user-id and password to retrieve some reports.

Music, Film, TV and the Internet A guide for parents and teachers Music, film and TV on the internet what you should know There are many great ways of accessing music, film, TV and video safely and legally

Digital Safety and Privacy Class Description: As computers and the Internet become more and more the way we communicate, we need to be aware of potential threats to our security online. This class discusses

Introduction Sibford School Student Computer Acceptable Use Policy The use of the latest technology is actively encouraged at Sibford School but with this comes a responsibility to protect both students

LESSON PLAN Scams and Schemes Essential Question What is identity theft, and how can you protect yourself from it? Lesson Overview Students learn strategies for guarding against identity theft and scams

Being able to use new technology is an important part of life for most teenagers and adults. You can use the Internet for activities like banking, buying tickets to events, ordering food, DVDs and clothes,

Music and the Internet A guide for parents and teachers Music on the internet what you should know There are many great ways of accessing music safely and legally online. This guide aims to keep parents,

Protecting Yourself from Identity Theft Identity theft is everywhere. In fact, according to a 2013 report by Javelin Research, there is one incident of identity fraud every two seconds. While we cannot

Topic 1 Lesson 1: Importance of network security 1 Initial list of questions Why is network security so important? Why are today s networks so vulnerable? How does Melissa virus work? How does I love you

Monthly ebrief August 2012 Protecting your business against External Fraud Welcome to another edition of our monthly ebriefs, brought to you by Aquila Advisory, the boutique forensic accounting company.

Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft

Internet Safety for Kids & Families Safety Tips for Social Networking As a social medium, the Internet enables young people to stay in touch with friends when they are physically separated from them and

HOW TO STAY SAFE Smartphones Smartphones provide a variety of interesting activities and ways for young people to engage with their friends and families. However, it is important to be aware of what these

Best Practices in Hiring by Mike Poskey ZERORISK HR If a job candidate looks good on paper and looks good in the interview, one would naturally assume this candidate would be a good fit for the job. While

Most people, young and old, can use a computer and mobile phone these days. Using computers, mobile phones, Tablets (like the ipad) and the internet can be fun and let you keep in touch with friends and

The 7 Most Cricitcal I.T. Security Protections Every Business Must Have in Place Now to Protect Themselves from Cybercrime, Data Breaches, and Hacker Attacks Cybercrime is at an all-time high, and hackers

The Mcafee 10-Step Internet Safety Plan for Your Family How to talk to kids, tweens, teens, and novices of any age about online security 10 Table of Contents 3 Introduction 4 5 Today s Internet: Proceed

PROTECTING YOURSELF FROM IDENTITY THEFT The Office of the Attorney General of Maryland Identity Theft Unit CONTENTS 1) What is Identity Theft? 2) How to Protect Yourself From ID Theft. 3) How to Tell If

Today s teens use technology more than ever. Most have high-speed Internet access, which they use to send instant messages to their friends, create blogs and online videos, keep personal profiles on social